Unlock For Us

Globally Unique Identifier or GUID is a 128-bit integer (16 bytes) identifier used in software applications in order to provide a unique reference number to identify a particular component. It is so unique that there's a very low probability or its impossible that any two or more component has the same value.

Net services commands (Net.exe) Performs a broad range of network tasks that is use to set, view, access and determine the network settings. Type net with no parameters (or by using net /?) to see the full list of available command-line options.

Netstat (Netstat.exe) Displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, and protocol statistics for IPv4/IPv6. Click Here to read the article for viewing the current connection.

Network Command Shell (Netsh.exe) Displays and modifies the network configuration of a currently running local or remote computer using thirteen sets of commands called contexts for performing a wide range of network configuration.

PathPing (Pathping.exe) Trace a path to a remote system and report packet losses at each router along the way to identify problems at a router or network link. Basically, It combines the functions of Traceroute and Ping.

TCP/IP NetBIOS Information (Nbtstat.exe) is a command-line tool to troubleshoot NetBIOS name-resolution problems. It Displays statistics for the NetBIOS over TCP/IP (NetBT) protocol, NetBIOS name tables for both the local computer and remote computers, and the NetBIOS name cache.

TCP/IP Ping (Ping.exe) This is a very useful tool that verifies (IP-level) connectivity to another computer or internet address by sending Internet Control Message Protocol (ICMP) packets and measuring response time in milliseconds.

TCP/IP Route (Route.exe) Displays and modifies entries in the local IP routing table.

TCP/IP Traceroute (Tracert.exe) Determines the path to an internet address, and lists the time required to reach each hop. It’s useful for troubleshooting connectivity problems on specific network segments.

To learn more about a specific command line tool including its proper syntax, type the executable name followed by /?.

Unlock For Us

Passwords are secret string of characters that help ensure unauthorized users do not access the computer. It is being use to log on to a computer system and access programs, documents, and other resources. This is being use widely on websites, and computers running in any operating system.

It can be made up of letters, numbers, especial symbols, and spaces.

Tips for creating a secure password

Is at least eight characters long

Does not contain your family name, user name, company name or any words relating to you

If you feel you must write down your password in order to remember the character combination, make sure you don't label it as your “secret” password, and keep it in a safe place. This time a random password generator is recommended.

Some people create an acronym from an easy-to-remember information of your personal information. For example, a phrase that is meaningful to you and its impossible for you to forget, such as My brothers birthday is 6 August, 1974. Using that phrase as your guide, you might use Mbbi6/Aug,74 for your password.

If your a kind of person that doesn’t wants to memorize complicated passwords and you want the plain and readable ones. This time, an encrypted password generator is recommended.

Unlock For Us

Windows Easy Transfer is a program that help users to migrate files and settings of computers such as personal files, media and e-mail from old computer to the new one such as Windows 7 or Vista.

It helps you choose what to transfer to your new computer, such as user accounts, Program data files and settings, Internet favorites, E-mail messages, settings, and contacts, photos, music, videos, Windows and Internet settings.

The wizard will guide the user through the process o f transferring files and settings from one Windows computer to another.

Note: No information is deleted from your old computer and all applications designed for the old Operating system will NOT be transferred.

Different Methods in Transferring the Files

Using the Network What you'll need: Both computers must be connected into a network and has the ability to access the same network folders.

Using DVDs or CDs What you'll need: Enough writeable discs to hold the data and settings and writeable DVD or CD drives on both computers.

USB flash drive or external hard disk

Easy Transfer Cable

How long does will it take to transfer the settings and files? How fast your files and settings are transferred will depend on several factors such as the amount and size of files and settings, speed of your computers and the transfer method you choose.

Can viruses, worms, trojans and spywares be transferred? Yes. Microsoft strongly recommend to scan your computer first by running antivirus and spyware protection programs at all times before you select files to transfer.

How to access the program

just use the start menu search or use the new version of WinBubble to open the application located at the Windows Utilities Tab if you forgot the name.

Unlock For Us

If you want to see the servers ip-address and clients new ip-address while connected in the internet, installed protocols and lists of broadband connections. I wrote several ways to open the Network connection list window easily.

Right Click the Network Icon > Network and Sharing Center

At the left side of the window click manage network connections

If your a first time user of Windows Vista, it is difficult to find the option.

Anywho, I’m going to give five more ways to open the window easily.

1. Press Win + R and type the following command

control netconnections

2. type ncpa.cpl in the Start Menu Search

3. In your desktop, create a folder called

Network Connections.{7007ACC7-3202-11D1-AAD2-00805FC1270E}

4. Using the new version of WinBubble you can easily add Items to My Computer and Control Panel Window that can serve as alternative to libraries in Windows 7.

Open WinBubble > Tools Tab > Using the second tool “My Computer and Control Panel Items” Group > Use the following settings